Smart Contract Security Vulnerabilities

نویسندگان

چکیده

A smart contract is a concept of computer protocols that helps to facilitate blockchain technology. This blockchain-based public ledger all participating transactions. It considered self-executable application and contains predetermined rules. also operates by decentralizing networks are shared between parties, this execution contracts parties could be securely done without middleman or third party. With technology, developers provide an efficient framework ensure security issues. While the new has successfully been developed prevent problems fraud hacking, there still considerable risk concerning confidentiality. Therefore, we should not underestimate matter. study aims review potential risks may take place on contracts. In addition, options assist in order viable guidance, avoiding these vulnerabilities.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Vulnerabilities of User Authentication Scheme Using Smart Card

With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerabl...

متن کامل

Securing Multi-Application Smart Cards by Security-by-Contract

The Security-by-Contract (S×C) framework has recently been proposed to support applications evolution in multi-application smart cards. The key idea is based on the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of a smart card. In this paper we address one of the key features needed to apply the S×C idea to a resou...

متن کامل

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

The traditional electrical power grid is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid with information and communication technologies (ICT). Such integration empowers the electrical utilities providers and consumers, improves the efficiency and the availability of the power system while constantly monitoring, controlling and managing the de...

متن کامل

IPv6 Security Vulnerabilities

Internet Protocol version 6 (IPv6) is the newest version of the protocol that is used for communications on the Internet. This version has been in existence for many years. But, currently many organizations have slowed their migration to IPv6 because they realize that the security considerations and products for IPv6 might be insufficient, despite the fact that the network infrastructure is rea...

متن کامل

Security vulnerabilities in IEEE 802.22

Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world’s first wireless standard based on CR technology. It defines the air interface for a wireless regional area network (WRAN) that uses fallow segments of the licensed (incumbent) TV broadcast bands. CR technology enables...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Erzincan University Journal of Science and Technology

سال: 2023

ISSN: ['1307-9085', '2149-4584']

DOI: https://doi.org/10.18185/erzifbed.1105551